exam questions

Exam Lead Auditor All Questions

View all questions & answers for the Lead Auditor exam

Exam Lead Auditor topic 1 question 49 discussion

Actual exam question from PECB's Lead Auditor
Question #: 49
Topic #: 1
[All Lead Auditor Questions]

Scenario: Cyber ACrypt is a cybersecurity company that provides endpoint protection by offering anti-malware and device security, asset life cycle management, and device encryption. To validate its ISMS against ISO/IEC 27001 and demonstrate its commitment to cybersecurity excellence, the company underwent a meticulous audit process led by John, the appointed audit team leader.
Upon accepting the audit mandate, John promptly organized a meeting to outline the audit plan and team roles. This phase was crucial for aligning the team with the audit's objectives and scope. However, the initial presentation to Cyber ACrypt's staff revealed a significant gap in understanding the audit's scope and objectives, indicating potential readiness challenges within the company.
As the stage 1 audit commenced, the team prepared for on-site activities. They reviewed Cyber ACrypt's documented information, including the information security policy and operational procedures ensuring each piece conformed to and was standardized in format with author identification, production date, version number, and approval date. Additionally, the audit team ensured that each document contained the information required by the respective clause of the standard. This phase revealed that a detailed audit of the documentation describing task execution was unnecessary, streamlining the process and focusing the team's efforts on critical areas. During the phase of conducting on-site activities, the team evaluated management responsibility for the Cyber ACrypt's policies. This thorough examination aimed to ascertain continual improvement and adherence to ISMS requirements. Subsequently, in the document, the stage 1 audit outputs phase, the audit team meticulously documented their findings, underscoring their conclusions regarding the fulfillment of the stage 1 objectives. This documentation was vital for the audit team and Cyber ACrypt to understand the preliminary audit outcomes and areas requiring attention.
The audit team also decided to conduct interviews with key interested parties. This decision was motivated by the objective of collecting robust audit evidence to validate the management system's compliance with ISO/IEC 27001 requirements. Engaging with interested parties across various levels of Cyber ACrypt provided the audit team with invaluable perspectives and an understanding of the ISMS's implementation and effectiveness.
The stage 1 audit report unveiled critical areas of concern. The Statement of Applicability (SoA) and the ISMS policy were found to be lacking in several respects, including insufficient risk assessment, inadequate access controls, and lack of regular policy reviews. This prompted Cyber ACrypt to take immediate action to address these shortcomings. Their prompt response and modifications to the strategic documents reflected a strong commitment to achieving compliance.
The technical expertise introduced to bridge the audit team's cybersecurity knowledge gap played a pivotal role in identifying shortcomings in the risk assessment methodology and reviewing network architecture. This included evaluating firewalls, intrusion detection and prevention systems, and other network security measures, as well as assessing how Cyber ACrypt detects, responds to, and recovers from external and internal threats. Under John's supervision, the technical expert communicated the audit findings to the representatives of Cyber ACrypt. However, the audit team observed that the expert's objectivity might have been compromised due to receiving consultancy fees from the auditee. Considering the behavior of the technical expert during the audit, the audit team leader decided to discuss this concern with the certification body.
According to scenario, Cyber ACrypt modified the SoA and the ISMS policy after the stage 1 audit report. How do you define this situation?

  • A. Unacceptable, once the external audit passes stage 1, the SoA and the ISMS policy cannot be modified
  • B. Acceptable, situations that lead to major nonconformities during the stage 2 audit should be corrected
  • C. Acceptable, minor modifications to the SoA and ISMS policy can be made until the submission of the final audit report
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ROCTW
3 weeks, 6 days ago
Selected Answer: B
The primary purpose of a Stage 1 audit is to assess an organization's readiness for the full certification audit (Stage 2). This includes evaluating the maturity of its Information Security Management System (ISMS) documentation, its understanding of the ISO/IEC 27001 standard's requirements, and identifying any significant gaps or deficiencies that could impede the Stage 2 audit. The scenario clearly states: "The stage 1 audit report unveiled critical areas of concern. The Statement of Applicability (SoA) and the ISMS policy were found to be lacking in several respects, including insufficient risk assessment, inadequate access controls, and lack of regular policy reviews." These were identified as critical deficiencies that, if left unaddressed, would likely result in major nonconformities during the Stage 2 audit.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...